Skip to main content

Detecting Betrayers in Online Environments Using Active Indicators

  • Conference paper
  • First Online:
Social, Cultural, and Behavioral Modeling (SBP-BRiMS 2018)

Abstract

Research into betrayal ranges from case studies of real-world betrayers to controlled laboratory experiments. However, the capability of reliably detecting individuals who have previously betrayed through an analysis of their ongoing behavior (after the act of betrayal) has not been studied. To this aim, we propose a novel method composed of a game and several manipulations to stimulate and heighten emotions related to betrayal. We discuss the results of using this game and the manipulations as a mechanism to spot betrayers, with the goal of identifying important manipulations that can be used in future studies to detect betrayers in real-world contexts. In this paper, we discuss the methods and results of modeling the collected game data, which include behavioral logs, to identify betrayers. We used several analysis methods based both on psychology-based hypotheses as well as machine learning techniques. Results show that stimuli that target engagement, persistence, feedback to teammates, and team trust produce behaviors that can contribute to distinguishing betrayers from non-betrayers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Herbig, K.L., Wiskoff, M.F.: Espionage against the united states by American citizens 1947–2001. Technical report, Defense Personnel Security Research Center Monterey CA (2002)

    Google Scholar 

  2. Cummings, A., Lewellen, T., McIntire, D., Moore, A.P., Trzeciak, R.: Insider threat study: illicit cyber activity involving fraud in the us financial services sector. Technical report, Carnegie Mellon University, Software Engineering Institute, Pittsburgh, PA (2012)

    Google Scholar 

  3. Kont, M., Pihelgas, M., Wojtkowiak, J., Trinberg, L., Osula, A.M.: Insider threat detection study. NATO CCD COE, Tallinn (2015)

    Google Scholar 

  4. Carter, M.: Massively multiplayer dark play: Treacherous play in eve online. The Dark Side of Game Play. Routledge, London (2015)

    Google Scholar 

  5. Ponemon Institute: 2016 cost of insider threats. Technical report, Traverse City, MI, USA (2016)

    Google Scholar 

  6. Greitzer, F.L., Paulson, P., Kangas, L., Franklin, L.R., Edgar, T.W., Frincke, D.A.: Predictive modelling for insider threat mitigation. Pacific Northwest National Laboratory, Richland, WA, Technical report, PNNL-65204 (2009)

    Google Scholar 

  7. Sasaki, T.: A framework for detecting insider threats using psychological triggers. JoWUA 3(1/2), 99–119 (2012)

    Google Scholar 

  8. Lane, J.D., Wegner, D.M.: The cognitive consequences of secrecy. J. Personal. Soc. Psychol. 69(2), 237 (1995)

    Article  Google Scholar 

  9. Kelly, A.E.: The Psychology of Secrets. Springer, Heidelberg (2002). https://doi.org/10.1007/978-1-4615-0683-6

    Book  Google Scholar 

  10. Charney, D.: True psychology of the insider spy. Intell.: J. US Intell. Stud. 18(1), 47–54 (2010)

    MathSciNet  Google Scholar 

  11. Intelligence Advanced Research Program Agency (IARPA): Iarpa scite program (2015)

    Google Scholar 

  12. Rashid, T., Agrafiotis, I., Nurse, J.R.: A new take on detecting insider threats: exploring the use of hidden markov models. In: Proceedings of the 2016 International Workshop on Managing Insider Security Threats, pp. 47–56. ACM (2016)

    Google Scholar 

  13. Bindu, P., Thilagam, P.S.: Mining social networks for anomalies: methods and challenges. J. Netw. Comput. Appl. 68, 213–229 (2016)

    Article  Google Scholar 

  14. Spitzner, L.: Honeypots: catching the insider threat. In: Computer Security Applications Conference, 2003. Proceedings. 19th Annual, pp. 170–179. IEEE (2003)

    Google Scholar 

  15. Peled, N., Bitan, M., Keshet, J., Kraus, S.: Predicting human strategic decisions using facial expressions. In: IJCAI, pp. 2035–2041 (2013)

    Google Scholar 

  16. Niculae, V., Kumar, S., Boyd-Graber, J., Danescu-Niculescu-Mizil, C.: Linguistic harbingers of betrayal: a case study on an online strategy game. arXiv preprint arXiv:1506.04744 (2015)

  17. Ho, S.M., Warkentin, M.: Leader’s dilemma game: an experimental design for cyber insider threat research. Inf. Syst. Front. 19(2), 377–396 (2017)

    Article  Google Scholar 

  18. Ho, S.M., Liu, X., Booth, C., Hariharan, A.: Saint or sinner? language-action cues for modeling deception using support vector machines. In: Xu, K., Reitter, D., Lee, D., Osgood, N. (eds.) Social, Cultural, and Behavioral Modeling. LNCS, vol. 9708, pp. 325–334. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-319-39931-7_31

    Chapter  Google Scholar 

  19. Burgoon, J.K., Dunbar, N.E.: An interactionist perspective on dominance-submission: interpersonal dominance as a dynamic, situationally contingent social skill. Commun. Monogr. 67(1), 96–121 (2000)

    Article  Google Scholar 

  20. Dunbar, N.E., Jensen, M.L., Bessarabova, E., Burgoon, J.K., Bernard, D.R., Harrison, K.J., Kelley, K.M., Adame, B.J., Eckstein, J.M.: Empowered by persuasive deception: the effects of power and deception on dominance, credibility, and decision making. Commun. Res. 41(6), 852–876 (2014)

    Article  Google Scholar 

  21. Anolli, L., Balconi, M., Ciceri, R.: Linguistic styles in deceptive communication: dubitative ambiguity and elliptic eluding in packaged lies. Soc. Behav. Personal.: Int. J. 31(7), 687–710 (2003)

    Article  Google Scholar 

  22. Von Ahn, L., Dabbish, L.: Labeling images with a computer game. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 319–326. ACM (2004)

    Google Scholar 

  23. Watson, D., Clark, L.A., Tellegen, A.: Development and validation of brief measures of positive and negative affect: the panas scales. J. Personal. Soc. Psychol. 54(6), 1063 (1988)

    Article  Google Scholar 

  24. Frank, E., Hall, M.A., Witten, I.H.: Weka 3: Data mining software in java (2017). http://www.cs.waikato.ac.nz/ml/weka/

Download references

Acknowledgments

The research is based upon work supported by the Office of the Director of National Intelligence (ODNI), Intelligence Advanced Research Projects Activity (IARPA), via contract number 2016-16031100003. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the ODNI, IARPA, or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright annotation thereon.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Paola Rizzo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rizzo, P., Jemmali, C., Leung, A., Haigh, K., El-Nasr, M.S. (2018). Detecting Betrayers in Online Environments Using Active Indicators. In: Thomson, R., Dancy, C., Hyder, A., Bisgin, H. (eds) Social, Cultural, and Behavioral Modeling. SBP-BRiMS 2018. Lecture Notes in Computer Science(), vol 10899. Springer, Cham. https://doi.org/10.1007/978-3-319-93372-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-93372-6_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-93371-9

  • Online ISBN: 978-3-319-93372-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics